Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
76646c24350afced1ee0979caf83fc4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76646c24350afced1ee0979caf83fc4f.exe
Resource
win10v2004-20231215-en
General
-
Target
76646c24350afced1ee0979caf83fc4f.exe
-
Size
323KB
-
MD5
76646c24350afced1ee0979caf83fc4f
-
SHA1
0235676f58db067e07d82af4de176f7830627b06
-
SHA256
b0556a15fd8fccd6c04c972e5178e95112ab6674a06958ee33644e3c639252db
-
SHA512
d2c2d6abe6c4c1c459f818b76cf556551f5453c84a2d371a5f5983a4cd64a57bbe9a100191369e128de4370e04e44f3c039eef92bcb498242d9a5efe99b4ef66
-
SSDEEP
3072:2B8Nu8xX7O+7GVlT9At9gMNNy9sEeR7Kw1lmGSKM4hMpCqgCCcxXbsPC35ynqoRh:E8Nu8Q+CVGmGtn2tpCtMflokFnxKV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 yjekpa.exe -
Loads dropped DLL 2 IoCs
pid Process 1668 76646c24350afced1ee0979caf83fc4f.exe 1668 76646c24350afced1ee0979caf83fc4f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\{99FD42C8-CEFB-AD4E-9644-6D1A8CD24E07} = "C:\\Users\\Admin\\AppData\\Roaming\\Byef\\yjekpa.exe" yjekpa.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Privacy 76646c24350afced1ee0979caf83fc4f.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 76646c24350afced1ee0979caf83fc4f.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe 2324 yjekpa.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 1668 76646c24350afced1ee0979caf83fc4f.exe 2324 yjekpa.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2324 1668 76646c24350afced1ee0979caf83fc4f.exe 28 PID 1668 wrote to memory of 2324 1668 76646c24350afced1ee0979caf83fc4f.exe 28 PID 1668 wrote to memory of 2324 1668 76646c24350afced1ee0979caf83fc4f.exe 28 PID 1668 wrote to memory of 2324 1668 76646c24350afced1ee0979caf83fc4f.exe 28 PID 2324 wrote to memory of 1068 2324 yjekpa.exe 11 PID 2324 wrote to memory of 1068 2324 yjekpa.exe 11 PID 2324 wrote to memory of 1068 2324 yjekpa.exe 11 PID 2324 wrote to memory of 1068 2324 yjekpa.exe 11 PID 2324 wrote to memory of 1068 2324 yjekpa.exe 11 PID 2324 wrote to memory of 1100 2324 yjekpa.exe 10 PID 2324 wrote to memory of 1100 2324 yjekpa.exe 10 PID 2324 wrote to memory of 1100 2324 yjekpa.exe 10 PID 2324 wrote to memory of 1100 2324 yjekpa.exe 10 PID 2324 wrote to memory of 1100 2324 yjekpa.exe 10 PID 2324 wrote to memory of 1132 2324 yjekpa.exe 8 PID 2324 wrote to memory of 1132 2324 yjekpa.exe 8 PID 2324 wrote to memory of 1132 2324 yjekpa.exe 8 PID 2324 wrote to memory of 1132 2324 yjekpa.exe 8 PID 2324 wrote to memory of 1132 2324 yjekpa.exe 8 PID 2324 wrote to memory of 1584 2324 yjekpa.exe 5 PID 2324 wrote to memory of 1584 2324 yjekpa.exe 5 PID 2324 wrote to memory of 1584 2324 yjekpa.exe 5 PID 2324 wrote to memory of 1584 2324 yjekpa.exe 5 PID 2324 wrote to memory of 1584 2324 yjekpa.exe 5 PID 2324 wrote to memory of 1668 2324 yjekpa.exe 13 PID 2324 wrote to memory of 1668 2324 yjekpa.exe 13 PID 2324 wrote to memory of 1668 2324 yjekpa.exe 13 PID 2324 wrote to memory of 1668 2324 yjekpa.exe 13 PID 2324 wrote to memory of 1668 2324 yjekpa.exe 13 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29 PID 1668 wrote to memory of 1768 1668 76646c24350afced1ee0979caf83fc4f.exe 29
Processes
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1584
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1132
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\76646c24350afced1ee0979caf83fc4f.exe"C:\Users\Admin\AppData\Local\Temp\76646c24350afced1ee0979caf83fc4f.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\Byef\yjekpa.exe"C:\Users\Admin\AppData\Roaming\Byef\yjekpa.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2324
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp3ee4050e.bat"3⤵
- Deletes itself
PID:1768
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD55ce2b9018c8b6bd6f33dab537df6dce5
SHA10862dc18217cf9bd9d2ad00f082434580efa920f
SHA25636a0a1c486761401ce7bc4b35ae85141a210d52fea2612cd531a6e424226b94e
SHA5120c1bb9d5b012973d2203f9b1c5902e0c64f09a8554bec93de653072020f622aa0ea82c81bbce2a35cd6fce759588a10a9f4de6769ae437afcb5fde35a5f587f9
-
Filesize
323KB
MD5c783f7474a52a64bae7774785ca7fdc5
SHA12caad7ee3b2307946420af3f8ee7e73374be3fae
SHA25684b9b82a56b2362585191604846452e4bcae145e3a8803798e73b7b9ad2d0fa9
SHA5129d1aa9e670e47a766cf6a16cd5bd0e30553809517745bd94a040c9dfae989d714beb68f152c34ebccabf4387a4de621addb8fed17a7bbbfba3641e6d08af8a53
-
Filesize
270KB
MD56f359787506baf5dc0911c7d535d241b
SHA19adee1601bb8c6d64fcc2494255735381abab794
SHA2560bf6eb062eb349a6d88766b71a1d093c93d68f7cd4dd3d890d0b881f3c510266
SHA512b1d064a540b0b541cc4b017700f48866aabeeb918beb9abfb5b8f2a8679185a7b93fe1d6abcb4f710db454b7dc8b26161d44e0dd4cb55ca8daf10f8b3825802d